|Skip Navigation Links|
|Exit Print View|
|System Administration Guide: Naming and Directory Services (NIS+)|
The permissions assigned to classes of NIS+ principals that determine what operations they can perform on NIS+ objects: read, modify, create, or destroy.
Application-level name services are incorporated in applications offering services such as files, mail, and printing. Application-level name services are bound below enterprise-level name services. The enterprise-level name services provide contexts in which contexts of application-level name services can be bound.
The determination of whether an NIS+ server can identify the sender of a request for access to the NIS+ namespace. Authenticated requests are divided into the authorization categories of owner, group, and world. Unauthenticated requests – the sender is unidentified, are placed in the Nobody category.
The program that manages the local caches of NIS+ clients (NIS_SHARED_DIRCACHE), which are used to store location information about the NIS+ servers that support the directories most frequently used by those clients, including transport addresses, authentication information, and a time-to-live value.
The process of writing changes to NIS+ data that are stored in server memory and recorded in the transaction log to the NIS+ tables stored on disk. In other words, updating the NIS+ tables with recent changes to the NIS+ data set.
(1) In NIS+, the client is a principal (machine or user) requesting an NIS+ service from an NIS+ server.
(2) In the client-server model for file systems, the client is a machine that remotely accesses resources of a compute server, such as compute power and large memory capacity.
(3) In the client-server model, the client is an application that accesses services from a “server process.” In this model, the client and the server can run on the same machine or on separate machines.
A common way to describe network services and the model user processes (programs) of those services. Examples include the name-server/name-resolver paradigm of the Domain Name System (DNS) and file-server/file-client relationships such as NFS and diskless hosts. See also client.
The NIS+ file given to a client when it is initialized that contains sufficient information so that the client can begin to contact the master server in its home domain.
The authentication information about an NIS+ principal that the client software sends along with each request to an NIS+ server. This information verifies the identity of a user or machine.
A key used to encipher and decipher data intended for programs that perform encryption. Contrast with key encrypting key.
A commonly used, highly sophisticated algorithm developed by the U.S. National Bureau of Standards for encrypting and decrypting data. See also SUN-DES-1.
The syntactic representation for a 32-bit integer that consists of four 8-bit numbers written in base 10 with periods (dots) separating them. Used to represent IP addresses in the Internet as in: 172.27.67.20.
See data encryption standard (DES).
(1) An NIS+ directory is a container for NIS+ objects such as NIS+ tables, groups, or subdirectories
(2) In UNIX, a container for files and subdirectories.
A local file used to store data associated with directory objects.
A distinguished name is an entry in an X.500 directory information base (DIB) composed of selected attributes from each entry in the tree along a path leading from the root down to the named entry.
See Domain Name System.
An NIS server or an NIS+ server with NIS compatibility set forwards requests it cannot answer to DNS servers.
A set of files wherein the DNS software stores the names and IP addresses of all the workstations in a domain.
Administrative boundaries within a network domain, often made up of one or more subdomains.
(1) In NIS+ a group of hierarchical objects managed by NIS+. There is one highest level domain (root domain) and zero or more subdomains. Domains and subdomains may be organized around geography, organizational or functional principles.
Parent domain. Relative term for the domain immediately above the current domain in the hierarchy.
Child domain. Relative term for the domain immediately below the current domain in the hierarchy.
Root domain. Highest domain within the current NIS+ hierarchy.
(2) In the Internet, a part of a naming hierarchy usually corresponding to a Local Area Network (LAN) or Wide Area Network (WAN) or a portion of such a network. Syntactically, an Internet domain name consists of a sequence of names (labels) separated by periods (dots). For example, sales.doc.com.
(3) In International Organization for Standardization's open systems interconnection (OSI), “domain” is generally used as an administrative partition of a complex distributed system, as in MHS private management domain (PRMD), and directory management domain (DMD).
The name assigned to a group of systems on a local network that share DNS administrative files. The domain name is required for the network information service database to work properly. See also domain.
A service that provides the naming policy and mechanisms for mapping domain and machine names to addresses outside of the enterprise, such as those on the Internet. DNS is the network information service used by the Internet.
See data encrypting key.
An enterprise-level naming service identifies (names) machines (hosts), users and files within an enterprise-level network.
An “enterprise-level” network can be a single Local Area Network (LAN) communicating over cables, infra-red beams, or radio broadcast; or a cluster of two or more LANs linked together by cable or direct phone connections. Within an enterprise-level network, every machine is able to communicate with every other machine without reference to a global naming service such as DNS or X.500/LDAP.
A single row of data in a database table.
See group ID.
A global naming service identifies (names) those enterprise-level networks around the world that are linked together by phone, satellite, or other communication systems. This world-wide collection of linked networks is known as the “Internet.” In addition to naming networks, a global naming service also identifies individual machines and users within a given network.
(1) A collection of users who are referred to by a common name.
(2) In NIS+ a collection of users who are collectively given specified access rights to NIS+ objects. NIS+ group information is stored in the NIS+ group table.
(3) In UNIX, groups determine a user's access to files. There are two types of groups: default user group and standard user group.
A number that identifies the default group for a user.
A naming format used to identify an entry in a table.
The world-wide collection of networks interconnected by a set of routers that enable them to function and communicate with each other as a single virtual network.
A 32-bit address assigned to hosts using TCP/IP. See decimal dotted notation.
Internet Protocol. The network layer protocol for the Internet protocol suite.
A unique number that identifies each host in a network.
An NIS+ table entry's data can be accessed from any column, regardless of that table's key.
A key used to encipher and decipher other keys, as part of a key management and distribution system. Contrast with data encrypting key.
A Solaris system process that stores private keys.
Multiple systems at a single geographical site connected together for the purpose of sharing and exchanging data and software.
Files that contain a list of DNS domain names and their corresponding mail hosts.
A workstation that functions as an email router and receiver for a site.
The server that maintains the master copy of the network information service database for a particular domain. Namespace changes are always made to the name service database kept by the domain's master server. Each domain has only one master server.
Management information systems (or services)
The process of translating workstation or user names to addresses.
Servers that run one or more network name services.
A network service that handles machine, user, printer, domain, router, an other network names and addresses.
A configuration file (/etc/nsswitch.conf) that defines the sources from which an NIS+ client can obtain its network information.
(1) A namespace stores information that users, workstations, and applications must have to communicate across the network.
(2) The set of all names in a naming system.
(3) NIS+ namespace, A collection of hierarchical network information used by the NIS+ software.
(4) NIS namespace. A collection of non-hierarchical network information used by the NIS software.
(5) DNS namespace. A collection of networked workstations that use the DNS software.
A number used by software to separate the local subnet address from the rest of a given Internet protocol address.
See Secure RPC password.
A distributed network information service containing key information about the systems and the users on the network. The NIS database is stored on the master server and all the replica or slave servers.
A distributed network information service containing hierarchical information about the systems and the users on the network. The NIS+ database is stored on the master server and all the replica servers.
For administrative purposes, an NIS+ environment refers to any situation in which the applicable nsswitch.conf file points to nisplus. Or any time a command is run with an option that forces it to operate on objects in an NIS+ namespace (for example, passwd -r nisplus).
An NIS+ domain, directory, table, or group. See domain, directory, group, and table.
A file that contains data updates destined for the NIS+ tables about objects in the namespace. Changes in the namespace are stored in the transaction log until they are propagated to replicas. The transaction log is cleared only after all of a master server's replicas have been updated.
A configuration of NIS+ that allows NIS clients to have access to the data stored in NIS+ tables. When in this mode, NIS+ servers can answer requests for information from both NIS and NIS+ clients.
A file used by NIS that holds information of a particular type, for example, the password entries of all users on a network or the names of all host machines on a network. Programs that are part of the NIS service query these maps. See also NIS.
See next naming system pointer.
The process by which an NIS+ master server transfers a change an NIS+ data to the domain's replica servers.
Entering data into NIS+ tables either from files or from NIS maps.
A number which a machine uses to rank the order in which it tries to obtain namespace information from NIS+ servers. A machine will first try all servers with a given rank number before trying any server with the next highest rank number. For example, a machine will query NIS+ servers with a rank number of 0 before it queries any server with a rank number of 1.
From the point of view of a client machine, a preferred NIS+ server is a server that the client should try to use for namespace information ahead of non-preferred servers. Servers that are listed in a client or domain's preferred server list are considered preferred servers for that client or domain.
A client_info table or a client_info file. Preferred server lists specify the preferred servers for a client or domain.
Any user of NIS+ information whose credentials have been stored in the namespace. Any user or machine that can generate a request to an NIS+ server.
There are two kinds of NIS+ principal, client users and client machines:
Root principal. A machine root user (user ID = 0). Requires only a DES credential.
User principal. Any non-root user (user ID > 0). Requires local and DES credentials.
The private component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The private key of the sender is only available to the owner of the key. Every user or machine has its own public and private key pair.
The public component of a pair of mathematically generated numbers, which, when combined with a private key, generates the DES key. The DES key in turn is used to encode and decode information. The public key is available to all users and machines. Every user or machine has their own public and private key pair.
An easy and popular paradigm for implementing the client-server model of distributed computing. A request is sent to a remote system to execute a designated procedure, using arguments supplied, and the result is returned to the caller.
NIS+ server that maintains a duplicate copy of the domain's master NIS+ server database. Replicas run NIS+ server software and maintain copies of NIS+ tables. A replica server increases the availability of NIS+ services. Each NIS+ domain should have at least one, and perhaps more, replicas. (In an NIS namespace, a replica server was known as a slave server.)
The process of converting workstation IP addresses to workstation names using the DNS software.
The master server for an NIS+ root domain.
NIS+ server that maintains a duplicate copy of the root domain's master NIS+ server database.
Password required by Secure RPC protocol. This password is used to encrypt the private key. This password should always be identical to the user's login password.
(1) In NIS+, NIS, and DNS, a host machine providing naming services to a network.
(2) In the client-server model for file systems, the server is a machine with computing resources (and is sometimes called the compute server), and large memory capacity. Client machines can remotely access and make use of these resources. In the client-server model for window systems, the server is a process that provides windowing services to an application, or “client process.” In this model, the client and the server can run on the same machine or on separate machines.
(3) A daemon that actually handles the providing of files.
See preferred server list.
(1) A server system that maintains a copy of the NIS database. It has a disk and a complete copy of the operating system.
(2) Slave servers are called replica servers in NIS+.
A working scheme that divides a single logical network into smaller physical networks to simplify routing.
In NIS+ a two-dimensional (nonrelational) database object containing NIS+ data in rows and columns. (In NIS an NIS map is analogous to an NIS+ table with two columns.) A table is the format in which NIS+ data is stored. NIS+ provides 16 predefined or system tables. Each table stores a different type of information.
See Transport Control Protocol (TCP).
Acronym for Transport Control Protocol/Interface Program. The protocol suite originally developed for the Internet. It is also called the Internet protocol suite. Solaris networks run on TCP/IP by default.
The major transport protocol in the Internet suite of protocols providing reliable, connection-oriented, full-duplex streams. Uses IP for delivery. See TCP/IP.
A network that connects multiple local-area networks (LANs) or systems at different geographical sites by phone, fiberoptic, or satellite links.
A global-level directory service defined by an Open Systems Interconnection (OSI) standard.